|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-77741-2 |
003 |
DE-He213 |
005 |
20220115232026.0 |
007 |
cr nn 008mamaa |
008 |
100917s2011 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387777412
|9 978-0-387-77741-2
|
024 |
7 |
|
|a 10.1007/978-0-387-77741-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Aycock, John.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Spyware and Adware
|h [electronic resource] /
|c by John Aycock.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIV, 146 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 50
|
505 |
0 |
|
|a Preface -- Introduction -- Getting There -- Staying There -- Keylogging -- Phoning Home -- Advertising -- Advertisement Implementation -- Tracking Users -- Conclusion -- References -- Index.
|
520 |
|
|
|a Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461426837
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387569390
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387777405
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 50
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-77741-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|